Unlike most security advisories from Microsoft, IT pros don't have to do much this time. The advisory just indicates that they should verify that the Malware Protection Engine is updated to version 1.1.6603.0 or higher, which means that the vulnerability is patched. Left unpatched, the vulnerability could lead to an elevation of privilege scenario. However, the attacker has to already have login credentials and needs to create "a specially crafted registry key" to be successful.

"An attacker who successfully exploited the vulnerability could gain the same user rights as the LocalSystem account," wrote Microsoft in the security advisory. "The vulnerability could not be exploited by anonymous users."

The vulnerability, discovered by security researcher and consultant Cesar Cerrudo, has not been taken advantaged by would-be attackers, according to Microsoft.

Possibly, Microsoft is trying to show with this security advisory that it is becoming more transparent about its patching process. The security team made an effort earlier this month to illuminate its silent update patching process.